USN-1197-1: Firefox and Xulrunner vulnerability

1 September 2011

firefox, xulrunner-1.9.2 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 11.04
  • Ubuntu 10.10
  • Ubuntu 10.04 LTS

Summary

A certificate authority issued fraudulent certificates.

Software Description

  • firefox - Mozilla Open Source web browser
  • xulrunner-1.9.2 - Mozilla Gecko runtime environment

Details

It was discovered that Dutch Certificate Authority DigiNotar had mis-issued multiple fraudulent certificates. These certificates could allow an attacker to perform a “man in the middle” (MITM) attack which would make the user believe their connection is secure, but is actually being monitored.

For the protection of its users, Mozilla has removed the DigiNotar certificate. Sites using certificates issued by DigiNotar will need to seek another certificate vendor.

We are currently aware of a regression that blocks one of two Staat der Nederlanden root certificates which are believed to still be secure. This regression is being tracked at https://launchpad.net/bugs/838322.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.04
firefox - 6.0.1+build1+nobinonly-0ubuntu0.11.04.1
Ubuntu 10.10
firefox - 3.6.21+build1+nobinonly-0ubuntu0.10.10.1
xulrunner-1.9.2 - 1.9.2.21+build1+nobinonly-0ubuntu0.10.10.1
Ubuntu 10.04 LTS
firefox - 3.6.21+build1+nobinonly-0ubuntu0.10.04.1
xulrunner-1.9.2 - 1.9.2.21+build1+nobinonly-0ubuntu0.10.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to restart Firefox and any applications that use Xulrunner to effect the necessary changes.

References